You can configure secure, single sign-on (SSO) authentication to the Command and Discover appliances through one or more security assertion markup language (SAML) identity providers.
When a user logs into a Command or Discover appliance that is configured as a service provider (SP) for SAML SSO authentication, the ExtraHop appliance requests authorization from the appropriate identity provider (IdP). The identity provider authenticates the user's credentials and then returns the authorization for the user to the ExtraHop appliance. The user is then able to access the ExtraHop system.
Configuration guides for specific identity providers are linked below. If your provider is not listed, apply the settings required by the ExtraHop appliance to your identity provider.
- SAML 2.0
- Support SP-initiated login flows
- Support signed SAML Responses
- Log into the Admin UI on the Discover or Command appliance.
- In the Access Settings section, click Remote Authentication.
- Select SAML from the remote authentication method drop-down list and then click Continue.
- Click View SP Metadata to view the Assertion Consumer Service (ACS)
URL and Entity ID of the ExtraHop appliance. These strings are required by your identity
provider to configure SSO authentication. You can also download a complete XML metadata file
that you can import into your identity provider configuration.
Note: You might need to manually edit the ACS URL if the URL contains an unreachable hostname, such as the default appliance hostname "extrahop". We recommend that you specify the fully qualified domain name for the ExtraHop appliance in the URL.
- Click Add Identity Provider to add the following information:
Provider Name: Type a name to identify your specific identity provider. This name appears on the ExtraHop appliance log in page after the Log in with text.
Entity ID: Paste the entity ID provided by your identity provider into this field.
SSO URL: Paste the single sign-on URL provided by your identity provider into this field.
Signing Certificate: Paste the X.509 certificate provided by your identity provider into this field.
Auto-provision users: When this option is selected, ExtraHop user accounts are automatically created when the user logs in through the identity provider. To manually control which users can log in, clear this checkbox and manually configure new remote users through the ExtraHop Admin UI or REST API. Any manually-created remote username should match the username configured on the identity provider.
Enable this identity provider: This option is selected by default and allows users to log into the appliance. To prevent users from logging in through this identity provider, clear the checkbox.
After the identity provider is configured, a table of all configured identity providers appears in a table. You can edit or delete the identity provider as needed.
You must configure the following set of user attributes before users can connect to the ExtraHop appliance through an identity provider. These attributes identify the user and allow ExtraHop-specific privileges.
The packetslevel attribute is only required if you have a connected Trace appliance.
|urn:oid:0.9.2342.19200300.100.1.3||Standard Attribute||Primary email address|
|urn:oid:22.214.171.124||sn||Standard Attribute||Last name|
|urn:oid:126.96.36.199||givenName||Standard Attribute||First name|
|urn:extrahop:saml:2.0:writelevel||Web UI and API Privileges||ExtraHop Attribute||Web UI, Admin UI, and REST API privileges|
|urn:extrahop:saml:2.0:packetslevel||Packet and Session Key Access||ExtraHop Attribute||Packet and session key access|
Write level and packet level privileges must be assigned to each user to control their access to the Web UI, Admin UI, and REST API. If you have a connected Trace appliance, you can also assign access to packets and session keys. For more information about privilege levels, see Users and user groups.
|writelevel Attribute Privileges|
|packetslevel Attribute Privileges|